June grade 12 terminology Flashcards
4G (LTE)
4G is the fourth generation of cellular wireless standard and is a successor to 3G. 4G
networks use different frequencies to transmit data and should achieve far higher speeds that
3G.
64-bit
64-bit computers have a processor that work with 64 bits at a time. This means that memory
addresses, register sizes, address and data bus sizes and instruction sizes are all 64 bits in
length. In other words the computer is able to process at most 64 bits of data at once.
Access point
Also called a base station, consists of a sender/receiver (transceiver) and an antenna which
transmits and receives radio signals so that the devices that have a wireless network card are
able to communicate with the rest of network.
Activation codes
A series of letters and digits that must be entered during software installation to authenticate
that copy of the software.
ADSL
Asymmetric digital subscriber line Digital Subscriber Line. Used by homes and businesses
for dedicated dig ital high speed connection to the internet over conventional phone lines.
Adware
Software that automatically displays or downloads advertising material such as banners or
pop- ups when a user is online.
Anomalies
Errors which occur when editing a database that has not been normalised. They include
UPDATE, INSERT and DELETE anomalies.
Anti virus software
Anti-virus software is a program or set of programs that are designed to detect, prevent and
remove software viruses, and other malicious software.
API
Application Programming Interface. The form of an API varies depending on the type of
programming language but often it is a library of programming modules which facilitate the
creation of applications which communicate with the Operating System.
Archive
To copy and compress data files to a long-term storage medium.
BitTorrent
BitTorrent is a peer-to-peer (P2P) file sharing protocol designed to reduce the bandwidth
required to transfer files. For example, if a user begins downloading a movie file, the
BitTorrent system will locate multiple computers with the same file and begin downloading
the file from several computers at once.
Artificial Intelligence
Simulation of human decision-making processes by a computer system.
Assembler
A program that translates a programmer’s code, written in Assembly Code, into executable
machine code.
BIOS
Basic Input Output System – the essential start up instructions of a computer, stored in ROM
on the motherboard.
Blockchain
A system in which a record of transactions made in bitcoin or another cryptocurrency are
maintained across several computers that are linked in a peer-to-peer network.
Asymmetric
Encryption
Cryptographic algorithms (keys) which comprise of two separate keys, one of which is secret
(or private) and one of which is public. The pair of keys are mathematically linked but one
cannot be derived from the other, i.e. if a user has the public key he cannot work out the
private key (or vice versa).
Attenuation
Attenuation is the reduction in signal strength while transmitting data. The further the signal
gets from the source the weaker it will become.
Audio and Video on
Demand (AVOD)
Video on demand (VOD) or audio and video on demand (AVOD) are systems which allow
users to select and watch/listen to video or audio content when they choose to, rather than
having to watch at a specific broadcast time.
AUP
Acceptable Usage Policy, a document that outlines the rights and responsibilities of users
within a network environment, including the consequences of violating these stipulations.
Audit trail
An audit trail (also called audit log) is a security-relevant chronological record, set of
records, and/or destination and source of records that provide documentary evidence of the
sequence of activities that have affected at any time a specific operation, procedure, or event.
Backup
A copy of data files and other relevant files stored to enable full restoration of service in the
event of data loss. There is a trend towards cloud based backup services.
Bandwidth
The total amount of data that can be transferred from one point to another in a given period
of time.
Biometrics
Security based on identification of unique physical characteristics of a person such as
fingerprints and retina.
Big Data
Big data is a combination of structured, semistructured and unstructured data collected by
organizations that can be mined for information and used in machine learning projects,
predictive modeling and other advanced analytics applications